Understanding Why Terrorist Operations Succeed Or Fail

Total Page:16

File Type:pdf, Size:1020Kb

Understanding Why Terrorist Operations Succeed Or Fail HOMELAND SECURITY PROGRAM Project supported by a RAND Investment in People and Ideas THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Homeland Security Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity. Understanding Why Terrorist Operations Succeed or Fail Brian A. Jackson, David R. Frelinger HOMELAND SECURITY PROGRAM Project supported by a RAND Investment in People and Ideas This Occasional Paper results from the RAND Corporation’s continuing program of self-initiated research. Support for such research is provided, in part, by the generosity of RAND’s donors and by the fees earned on client-funded research. Library of Congress Cataloging-in-Publication Data Jackson, Brian A. Understanding why terrorist operations succeed or fail / Brian A. Jackson, David R. Frelinger. p. cm. Includes bibliographical references. ISBN 978-0-8330-4767-0 (pbk. : alk. paper) 1. Terrorism—Psychological aspects. 2. Terrorists—Attitudes. 3. Terrorism—Planning. 4. Terrorism—Prevention. I. Frelinger, Dave. II. Title. HV6431.J2838 2009 363.325—dc22 2009029748 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2009 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND Web site is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/ permissions.html). Published 2009 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Preface Created in the wake of the September 11, 2001, terrorist attacks, the Department of Home- land Security came into being with the daunting core mission of taking action to protect the nation from terrorist attack and the simultaneous requirement to continue to perform the numerous other critical functions of all its component agencies. The complexity of the depart- ment’s mission was further compounded by the fact that it depended not only on the success of the department’s component agencies, but also on the efforts of a national homeland-security enterprise comprised of organizations at the federal, state, and local levels, both inside and outside government. That there have been challenges in carrying out this endeavor in the years since should surprise no one. However, it has also been the fortunate reality that, whatever those challenges, at the time of this writing, there have been no major terrorist attacks within the United States since 9/11. This paper is one of a series of short papers that began as the result of a RAND research effort during the transition in presidential administrations in 2008–2009. As the first change in administration since the creation of the Department of Homeland Security, this period rep- resented an opportunity to reexamine and revisit the goals of homeland security policy and assess how we as a nation are trying to achieve them, ask whether what we are doing is work- ing, and make adjustments where necessary. The goal of RAND’s research effort was not to comprehensively cover homeland security writ large, but rather to focus on a small set of policy areas, produce essays exploring different approaches to various policy problems, and frame key questions that need to be answered if homeland security policy is to be improved going forward. The results of this effort were diverse, ranging from thought experiments about ways to reframe individual policy problems to more wide-ranging examinations of broader policy regimes. These discussions should be of interest to homeland security policymakers at the federal, state, and local levels and to members of the public interested in homeland security and counterterrorism. This paper examines the issue of why terrorist operations succeed or fail. Given the importance of this issue for security planning, there is a significant literature on the topic, and a variety of these contributions identify factors that can shape operations going well or poorly. This paper reacts to and responds to that literature and proposes an overarching framework for thinking through why attack options can have very different outcomes. In it, we argue that such a framework is critical for security planning efforts because focusing on individual factors in isolation risks producing an overall picture that does not accurately describe terrorist behavior. This effort is built on a broad foundation of RAND homeland security research and analysis carried out both before and since the founding of the Department of Homeland Secu- rity. Examples of those studies include: iii iv Understanding Why Terrorist Operations Succeed or Fail • Brian A. Jackson, Peter Chalk, Kim Cragin, Bruce Newsome, John V. Parachini, Wil- liam Rosenau, Erin M. Simpson, Melanie W. Sisson, and Donald Temple, Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies, Santa Monica, Calif.: RAND Corporation, MG-481-DHS, 2007. • Tom LaTourrette, David R. Howell, David E. Mosher, and John MacDonald, Reduc- ing Terrorism Risk at Shopping Centers: An Analysis of Potential Security Options, Santa Monica, Calif.: RAND Corporation, TR-401, 2006. • Henry H. Willis, Andrew R. Morral, Terrence K. Kelly, and Jamison Jo Medby, Estimat- ing Terrorism Risk, Santa Monica, Calif.: RAND Corporation, MG-388-RC, 2005. Although the ideas and frameworks described in this paper have been developed over sev- eral years of research for the Department of Homeland Security, the National Institute of Jus- tice, the Defense Threat Reduction Agency, the Office of the Secretary of Defense, and other sponsors, the views expressed herein are not necessarily those of RAND or of any of its research sponsors. The authors would also like to acknowledge the contribution of the two reviewers of the manuscript, Bruce Hoffman and Ami Pedahzur, whose comments were very helpful in improving the paper. Its remaining shortcomings are the sole responsibility of the authors. The RAND Homeland Security Program This research was conducted under the auspices of the Homeland Security Program within RAND Infrastructure, Safety, and Environment (ISE). The mission of RAND Infrastruc- ture, Safety, and Environment is to improve the development, operation, use, and protection of society’s essential physical assets and natural resources and to enhance the related social assets of safety and security of individuals in transit and in their workplaces and communities. Homeland Security Program research supports the Department of Homeland Security and other agencies charged with preventing and mitigating the effects of terrorist activity within U.S. borders. Projects address critical infrastructure protection, emergency management, ter- rorism risk management, border control, first responders and preparedness, domestic threat assessments, domestic intelligence, and workforce and training. Information about the Home- land Security Program is available online (http://www.rand.org/ise/security/). Inquiries about homeland security research projects should be sent to the following address: Andrew Morral, Director Homeland Security Program,
Recommended publications
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • Between Islamization and Secession: the Contest for Northern Mali
    JULY 2012 . VOL 5 . ISSUE 7 Contents Between Islamization and FEATURE ARTICLE 1 Between Islamization and Secession: Secession: The Contest for The Contest for Northern Mali By Derek Henry Flood Northern Mali REPORTS By Derek Henry Flood 6 A Profile of AQAP’s Upper Echelon By Gregory D. Johnsen 9 Taliban Recruiting and Fundraising in Karachi By Zia Ur Rehman 12 A Biography of Rashid Rauf: Al-Qa`ida’s British Operative By Raffaello Pantucci 16 Mexican DTO Influence Extends Deep into United States By Sylvia Longmire 19 Information Wars: Assessing the Social Media Battlefield in Syria By Chris Zambelis 22 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts An Islamist fighter from the Movement for Unity and Jihad in West Africa in the city of Gao on July 16, 2012. - AFP/Getty Images n january 17, 2012, a rebellion 22, disgruntled Malian soldiers upset began in Mali when ethnic about their lack of support staged a coup Tuareg fighters attacked a d’état, overthrowing the democratically Malian army garrison in the elected government of President Amadou Oeastern town of Menaka near the border Toumani Touré. with Niger.1 In the conflict’s early weeks, the ethno-nationalist rebels of the By April 1, all Malian security forces had National Movement for the Liberation evacuated the three northern regions of of Azawad (MNLA)2 cooperated and Kidal, Gao and Timbuktu. They relocated About the CTC Sentinel sometimes collaborated with Islamist to the garrisons of Sévaré, Ségou, and The Combating Terrorism Center is an fighters of Ansar Eddine for as long as as far south as Bamako.4 In response, independent educational and research the divergent movements had a common Ansar Eddine began to aggressively institution based in the Department of Social enemy in the Malian state.3 On March assert itself and allow jihadists from Sciences at the United States Military Academy, regional Islamist organizations to West Point.
    [Show full text]
  • Meeting the Anti-Access and Area-Denial Challenge
    Meeting the Anti-Access and Area-Denial Challenge Andrew Krepinevich, Barry Watts & Robert Work 1730 Rhode Island Avenue, NW, Suite 912 Washington, DC 20036 Meeting the Anti-Access and Area-Denial Challenge by Andrew Krepinevich Barry Watts Robert Work Center for Strategic and Budgetary Assessments 2003 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS The Center for Strategic and Budgetary Assessments is an independent public policy research institute established to promote innovative thinking about defense planning and investment strategies for the 21st century. CSBA’s analytic-based research makes clear the inextricable link between defense strategies and budgets in fostering a more effective and efficient defense, and the need to transform the US military in light of the emerging military revolution. CSBA is directed by Dr. Andrew F. Krepinevich and funded by foundation, corporate and individual grants and contributions, and government contracts. 1730 Rhode Island Ave., NW Suite 912 Washington, DC 20036 (202) 331-7990 http://www.csbaonline.org CONTENTS EXECUTIVE SUMMARY .......................................................................................................... I I. NEW CHALLENGES TO POWER PROJECTION.................................................................. 1 II. PROSPECTIVE US AIR FORCE FAILURE POINTS........................................................... 11 III. THE DEPARTMENT OF THE NAVY AND ASSURED ACCESS: A CRITICAL RISK ASSESSMENT .29 IV. THE ARMY AND THE OBJECTIVE FORCE ..................................................................... 69 V. CONCLUSIONS AND RECOMMENDATIONS .................................................................... 93 EXECUTIVE SUMMARY During the Cold War, the United States defense posture called for substantial forces to be located overseas as part of a military strategy that emphasized deterrence and forward defense. Large combat formations were based in Europe and Asia. Additional forces—both land-based and maritime—were rotated periodically back to the rear area in the United States.
    [Show full text]
  • The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
    New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan.
    [Show full text]
  • Ground Combat Overmatch Through Control of the Atmospheric
    Romanian soldier fires rocket propelled grenade at range near Bemowo Piskie Training Area, Poland, January 24, 2018, as part of multinational battle group comprised of U.S., UK, Croatian, and Romanian soldiers supporting NATO’s Enhanced Forward Presence (U.S. Army/Andrew McNeil) he U.S. military is seeking dis- Ground Combat ruptive innovations to sustain T its technological advantage despite rapid advances by potential adversaries. The need is particularly Overmatch Through acute in ground combat, where most U.S. casualties are sustained and where game-changing technical innovations Control of the have been less common than in other military mission areas. The Search for Tactical Atmospheric Littoral Overmatch In addition to increasing technologi- By George M. Dougherty cal pressure, recent coalition combat experiences and defense studies suggest that the future battlefield will be more complex than in the past. Combat in built-up areas including megacities will become commonplace. As concluded Colonel George M. Dougherty, USAF, is the Individual Mobilization Augmentee to the Deputy Assistant Secretary of the Air Force for Science, Technology, and Engineering, Office of the Assistant Secretary of by a recent report, “Urban operations the Air Force for Acquisition and Logistics, in Washington, DC. in the 21st century are not just another 64 Features / Control of the Atmospheric Littoral JFQ 94, 3rd Quarter 2019 type of operation; they will become this tion of robotics and autonomy to forces can move, concentrate, and century’s signature form of warfare.”1 the land domain has focused largely disperse without hindrance, much The pivotal battles in Iraq and Syria on unmanned ground vehicles.
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • Intelligence and Security Committee – Annual Report
    Intelligence and Security Committee – Annual Report 2011–2012 Intelligence and Security Committee – Intelligence and Security Committee Annual Report 2011–2012 Chairman: The Rt. Hon. Sir Malcolm Rifkind, MP Published by TSO (The Stationery Office) and available from: Online www.tsoshop.co.uk Mail, Telephone, Fax & E-mail TSO PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 Email: [email protected] Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square London SW1A 2JX Telephone orders/General enquiries: 020 7219 3890 INSERT Fax orders: 020 7219 3866 BARCODE Email: [email protected] Internet: www.bookshop.parliament.uk TSO@Blackwell and other accredited agents Intelligence and Security Committee Annual Report 2011–2012 Chairman: The Rt. Hon. Sir Malcolm Rifkind, MP Intelligence Services Act 1994 Chapter 13 Presented to Parliament by the Prime Minister By Command of Her Majesty July 2012 Cm 8403 £21.25 © Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit www.nationalarchives.gov.uk/doc/open-government-licence/ or email [email protected] Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us at [email protected] This publication is available for download at www.official-documents.gov.uk ISBN: 9780101840323 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID P002500979 07/12 21937 19585 Printed on paper containing 75% recycled fibre content minimum.
    [Show full text]
  • Army Fires Capabilities for 2025 and Beyond
    Army Fires Capabilities for 2025 and Beyond John Gordon IV, Igor Mikolic-Torreira, D. Sean Barnett, Katharina Ley Best, Scott Boston, Dan Madden, Danielle C. Tarraf, Jordan Willcox C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RR2124 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9967-9 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Cover: Army photo by Spc. Josselyn Fuentes. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled Army Fires for Army 2025, sponsored by the Field Artil- lery School at Fort Sill, Oklahoma (a part of the U.S.
    [Show full text]
  • Towards a Visual Analysis of Videogames and Social Media
    This is a repository copy of Visualizing war? : Towards a visual analysis of videogames and social media. White Rose Research Online URL for this paper: https://eprints.whiterose.ac.uk/116956/ Version: Accepted Version Article: Robinson, Nick and Schulzke, Marcus Brady orcid.org/0000-0002-5998-138X (2016) Visualizing war? : Towards a visual analysis of videogames and social media. Perspectives on Politics. pp. 995-1010. ISSN 1537-5927 https://doi.org/10.1017/S1537592716002887 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ This is an author produced version of Visualising War? Towards A Visual Analysis of Videogames and Social Media. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/97841/ Article: Robinson, NT and Schulzke, M (2016) Visualising War? Towards A Visual Analysis of Videogames and Social Media. Perspectives on Politics, 14 (4). pp. 995-1010. ISSN 1537-5927 https://doi.org/10.1017/S1537592716002887 (c) 2016, American Political Science Association.
    [Show full text]
  • RSCAS 2017/28 Islamic Terrorism in the West and International Migrations
    RSCAS 2017/28 Robert Schuman Centre for Advanced Studies Islamic Terrorism in the West and International Migrations: The “Far” or “Near” Enemy Within? What is the Evidence Maria do Céu Pinto Arena European University Institute Robert Schuman Centre for Advanced Studies Islamic Terrorism in the West and International Migrations: The “Far” or “Near” Enemy Within? What is the Evidence Maria do Céu Pinto Arena EUI Working Paper RSCAS 2017/28 This text may be downloaded only for personal research purposes. Additional reproduction for other purposes, whether in hard copies or electronically, requires the consent of the author(s), editor(s). If cited or quoted, reference should be made to the full name of the author(s), editor(s), the title, the working paper, or other series, the year and the publisher. ISSN 1028-3625 © Maria do Céu Pinto Arena, 2017 Printed in Italy, May 2017 European University Institute Badia Fiesolana I – 50014 San Domenico di Fiesole (FI) Italy www.eui.eu/RSCAS/Publications/ www.eui.eu cadmus.eui.eu Robert Schuman Centre for Advanced Studies The Robert Schuman Centre for Advanced Studies (RSCAS), created in 1992 and directed by Professor Brigid Laffan, aims to develop inter-disciplinary and comparative research and to promote work on the major issues facing the process of integration and European society. The Centre is home to a large post-doctoral programme and hosts major research programmes and projects, and a range of working groups and ad hoc initiatives. The research agenda is organised around a set of core themes and is continuously evolving, reflecting the changing agenda of European integration and the expanding membership of the European Union.
    [Show full text]
  • Jonathan Evans, Former Director General, MI5 Raffaello Pantucci EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D
    OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYMARCH 2020 2018 · VOLUME · VOLUME 13, 11,ISSUE ISSUE 3 6 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE The TheJihadi Hanau Threat LTC(R)Jonathan Bryan Price Terrorist Attack toHow race Indonesia hate and conspiracy theories Evans are fueling global far-right violence Former Director, Former Director General, MI5 Blyth CrawfordKirsten E.and Schulze Florence Keen Combating Terrorism Center FEATURE ARTICLE Editor in Chief 1 The Hanau Terrorist Attack: How Race Hate and Conspiracy Theories Are Fueling Global Far-Right Violence Paul Cruickshank Blyth Crawford and Florence Keen Managing Editor INTERVIEW Kristina Hummel 9 A View from the CT Foxhole: Jonathan Evans, Former Director General, MI5 Raffaello Pantucci EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head 16 The Pensacola Terrorist Attack: The Enduring Influence of al-Qa`ida and its Dept. of Social Sciences (West Point) Affiliates Colin P. Clarke Brian Dodwell Director, CTC 24 Dollars for Daesh: The Small Financial Footprint of the Islamic State's American Supporters Don Rassler Lorenzo Vidino, Jon Lewis, and Andrew Mines Director of Strategic Initiatives, CTC 30 Addressing the Enemy: Al-Shabaab's PSYOPS Media Warfare Christopher Anzalone CONTACT Combating Terrorism Center Far-right terror is going global, propelled to a significant degree by an on- line ecosystem of extremists posting in English. Since 2018, attackers U.S. Military Academy have targeted synagogues in Pittsburgh, Pennsylvania; the towns of Poway, 607 Cullum Road, Lincoln Hall California, and Halle, Germany; mosques in Christchurch, New Zealand; and a Walmart in El Paso, Texas. In this month’s feature article, Blyth Crawford and Florence Keen examine the February 19, West Point, NY 10996 2020, far-right terrorist attack that targeted shisha bar customers in the German town of Hanau and Phone: (845) 938-8495 led to the death of nine victims.
    [Show full text]
  • Summary of the 2018 National Defense Strategy
    Summary of the 2 0 1 8 National Defense Strategy of The United States of America Sharpening the American Military’s Competitive Edge Table of Contents Introduction ………………………………………………………………………………….…. 1 Strategic Environment ………………………………………………………………………….. 2 Department of Defense Objectives ……………………………………………………………... 4 Strategic Approach ……………………………………………………………………………… 4 Build a More Lethal Force ………………………………………………………………. 5 Strengthen Alliances and Attract New Partners …………………………………………. 8 Reform the Department for Greater Performance and Affordability ……………………10 Conclusion …………………………………………………………………………….……….. 11 NATIONAL DEFENSE STRATEGY INTRODUCTION The Department of Defense’s enduring mission is to provide combat-credible military forces needed to deter war and protect the security of our nation. Should deterrence fail, the Joint Force is prepared to win. Reinforcing America’s traditional tools of diplomacy, the Department provides military options to ensure the President and our diplomats negotiate from a position of strength. Today, we are emerging from a period of strategic atrophy, aware that our competitive military advantage has been eroding. We are facing increased global disorder, characterized by decline in the long-standing rules-based international order—creating a security environment more complex and volatile than any we have experienced in recent memory. Inter-state strategic competition, not terrorism, is now the primary concern in U.S. national security. China is a strategic competitor using predatory economics to intimidate its neighbors while militarizing features in the South China Sea. Russia has violated the borders of nearby nations and pursues veto power over the economic, diplomatic, and security decisions of its neighbors. As well, North Korea’s outlaw actions and reckless rhetoric continue despite United Nation’s censure and sanctions. Iran continues to sow violence and remains the most significant challenge to Middle East stability.
    [Show full text]